cerbersec Profile Banner
Cerbersec Profile
Cerbersec

@cerbersec

Followers
4K
Following
1K
Media
59
Statuses
854

I make things to break things | non-Blue Team @NVISOSecurity | Opinions are my own

Underworld
Joined January 2020
Don't wanna be here? Send us removal request.
@cerbersec
Cerbersec
3 months
Ran into strict WDAC a little while ago, bypassed it using WinDbg Preview.
6
49
128
@cerbersec
Cerbersec
13 days
Responder not working? LLMNR/NBNS enabled in the environment?. Check for ADIDNS wildcard records preventing the fallback to older protocols. #redteam #redteamtips.
0
7
48
@cerbersec
Cerbersec
17 days
The difference between innovating or playing catch-up.
Tweet media one
0
2
19
@cerbersec
Cerbersec
22 days
RT @_winterknife_: @cerbersec Here is the actual code if anyone wants to play with it: Just a random experiment lo….
0
1
0
@cerbersec
Cerbersec
24 days
They'll mimikatz your LSASS on DC01 before the SOC analyst finishes their coffee on Monday morning and looks at their dashboard.
2
2
42
@cerbersec
Cerbersec
24 days
Your average non-state APT doesn't use browser exploits for initial access. They don't give a shit about the kernel or the EDR, they don't deploy rootkits. They use phishing/breached creds w/ VPN, pwn your ADCS , then delete your backups and deploy ransomware, all loud as fuck.
13
49
370
@cerbersec
Cerbersec
24 days
Some people out here posting old tech and slapping a new sticker on it, steal other people's code and publish it as their own original work, acting big because they've got a bunch of skids in their comments, yet offended when actual infosec sees right through the bs. Be humble.
1
0
26
@cerbersec
Cerbersec
1 month
Malware development =/= red teaming. If you want to land an offensive security/RT role, go get some fundamental training as an operator. Good places to start are @hackthebox_eu and @_ZeroPointSec 's RTO certifications.
5
10
126
@cerbersec
Cerbersec
1 month
So since Microsoft retired MSOnline and AADInternals no longer works, what do people use to compromise Azure?.
11
5
101
@cerbersec
Cerbersec
1 month
I touched some asphalt 💪
Tweet media one
Tweet media two
0
0
13
@cerbersec
Cerbersec
1 month
you love to see it 💯.
@M_alphaaa
Matt Ehrnschwender
1 month
I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. Supporting blog post about it.
0
0
2
@cerbersec
Cerbersec
2 months
Microsoft: *adds more security boundaries*.@0xBoku : hold my 🍺(probably).
@dwizzzleMSFT
David Weston (DWIZZZLE)
2 months
We are removing default admin accounts in Windows 11 - get your apps ready now.
0
0
9
@cerbersec
Cerbersec
2 months
RT @yudasm_: What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution?.We explored process injection using….
0
77
0
@cerbersec
Cerbersec
2 months
RT @almartiros: RedTeamTP is now public, link below. The repo is a proof of concept of how to utilize GitHub Actions to automate offensive….
0
11
0
@cerbersec
Cerbersec
2 months
For other people wondering about the shellcode part.
@chompie1337
chompie
2 months
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.
0
13
53
@cerbersec
Cerbersec
2 months
There's no such thing as a "main" thread in a process on Windows. TIL.
3
0
3
@cerbersec
Cerbersec
2 months
Hey @_dirkjan I've added Shadow Credentials options to however using coercion + AD DNS I cannot seem to relay to LDAP. Do you know if this is a protocol limitation?.
0
13
70
@cerbersec
Cerbersec
3 months
RT @rad9800: Join the waitlist today for the Deception Engineering platform.
Tweet media one
0
8
0
@cerbersec
Cerbersec
3 months
New Chinese #BRICKSTORM backdoor analysis by NVISO:.
0
5
6
@cerbersec
Cerbersec
3 months
RT @hasherezade: My new blog for Check Point Research - check it out! 💙 // #ProcessInjection : #WaitingThreadHijacking.
0
133
0